[1] 冯长有, 姚伟锋, 江叶峰, 等. 特高压直流运行风险评估技术研究及应用[J]. 智慧电力, 2020, 48(7): 30–37 FENG Changyou, YAO Weifeng, JIANG Yefeng, et al. Study and application of UHVDC operation risk evaluation[J]. Smart Power, 2020, 48(7): 30–37 [2] 宋锦海, 李雪明, 姬长安, 等. 安全稳定控制装置的发展现状及展望[J]. 电力系统自动化, 2005, 29(23): 91–96 SONG Jinhai, LI Xueming, JI Changan, et al. Current situation and development prospect of security and stability control equipment[J]. Automation of Electric Power Systems, 2005, 29(23): 91–96 [3] 李满礼, 倪明, 颜云松, 等. 面向恶意攻击的安全稳定控制系统信息物理协调防御方法[J]. 电力系统自动化, 2021, 45(18): 113–121 LI Manli, NI Ming, YAN Yunsong, et al. Cyber-physical coordinated defense method against malicious attacks for security and stability control system[J]. Automation of Electric Power Systems, 2021, 45(18): 113–121 [4] 余勇, 林为民, 何军. 电力数字证书服务系统的设计及应用[J]. 电力系统自动化, 2005, 29(10): 64–68 YU Yong, LIN Weimin, HE Jun. Design and application of power digital certificate service system[J]. Automation of Electric Power Systems, 2005, 29(10): 64–68 [5] 史开泉, 陈泽雄. 电力系统加密通信与通信认证问题[J]. 中国电机工程学报, 2002, 22(10): 34–38 SHI Kaiquan, CHEN TerShyong. Problems on encrypt communication in electric power system and communication authentication[J]. Proceedings of the CSEE, 2002, 22(10): 34–38 [6] 赵兵, 高欣, 郜盼盼, 等. 适用于用电信息采集的轻量级认证密钥协商协议[J]. 电力系统自动化, 2013, 37(12): 81–86 ZHAO Bing, GAO Xin, GAO Panpan, et al. A lightweight authenticated protocol with key agreement for power utilization information collecting[J]. Automation of Electric Power Systems, 2013, 37(12): 81–86 [7] 赵兵, 高欣, 翟峰, 等. 面向用电信息采集系统的双向认证协议[J]. 电网技术, 2014, 38(9): 2328–2335 ZHAO Bing, GAO Xin, ZHAI Feng, et al. Mutual authentication protocol for electricity consumption information acquisition system[J]. Power System Technology, 2014, 38(9): 2328–2335 [8] 田福粮, 田秀霞, 陈希. 基于区块链的智能电表身份认证方案[J]. 华东师范大学学报(自然科学版), 2018(5): 135–143,171 TIAN Fuliang, TIAN Xiuxia, CHEN Xi. Blockchain-based smart meter authentication scheme[J]. Journal of East China Normal University (Natural Science), 2018(5): 135–143,171 [9] LEEA W B, CHEN T H, SUN W R, et al. An S/key-like one-time password authentication scheme using smart cards for smart meter[C]//2014 28 th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC, Canada. IEEE, 2014: 281-286. [10] BADAR H M S, QADRI S, SHAMSHAD S, et al. An identity based authentication protocol for smart grid environment using physical uncloneable function[J]. IEEE Transactions on Smart Grid, 2021, 12(5): 4426–4434. [11] TSAI J L, LO N W. Secure anonymous key distribution scheme for smart grid[J]. IEEE Transactions on Smart Grid, 2016, 7(2): 906–914. [12] 陈汹, 朱钰, 封科, 等. 基于区块链的电力系统安全稳定控制终端身份认证[J]. 广西师范大学学报(自然科学版), 2020, 38(2): 8–18 CHEN Xiong, ZHU Yu, FENG Ke, et al. Identity authentication of power system safety and stability control terminals based on blockchain[J]. Journal of Guangxi Normal University (Natural Science Edition), 2020, 38(2): 8–18 [13] 钱卫宁, 邵奇峰, 朱燕超, 等. 区块链与可信数据管理: 问题与方法[J]. 软件学报, 2018, 29(1): 150–159 QIAN Weining, SHAO Qifeng, ZHU Yanchao, et al. Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018, 29(1): 150–159 [14] 陈贵海, 吴帆, 李宏兴, 等. 基于DHT的P2P系统中高可用数据冗余机制[J]. 计算机学报, 2008, 31(10): 1695–1704 CHEN Guihai, WU Fan, LI Hongxing, et al. Redundancy schemes for high availability in DHTs[J]. Chinese Journal of Computers, 2008, 31(10): 1695–1704 [15] 徐鑫乾, 徐铼, 陈杰, 等. 基于移动无线传感网的电缆通道应急监测系统[J]. 中国电力, 2020, 53(1): 66–71, 99 XU Xinqian, XU Lai, CHEN Jie, et al. An emergency monitoring system for power cable tunnels based on mobile wireless sensor network[J]. Electric Power, 2020, 53(1): 66–71, 99 [16] 刘喜梅, 马俊杰. 泛在电力物联网在电力设备状态监测中的应用[J]. 电力系统保护与控制, 2020, 48(14): 69-75. LIU Ximei, MA Junjie. Application of the ubiquitous power Internet of Things in state monitoring of power equipment[J]. Power System Protection and Control, 2020, 48(14): 69-75. [17] 张显, 谢开, 张圣楠, 等. 基于区块链的可再生能源超额消纳量交易体系[J]. 中国电力, 2020, 53(9): 60–70 ZHANG Xian, XIE Kai, ZHANG Shengnan, et al. Excessive consumption trading system for the accommodation of renewable energies based on blockchain[J]. Electric Power, 2020, 53(9): 60–70 [18] STOICA I, MORRIS R, LIBEN-NOWELL D, et al. Chord: a scalable peer-to-peer lookup protocol for Internet applications[J]. IEEE/ACM Transactions on Networking, 2003, 11(1): 17–32. [19] ASPNES J, SHAH G. Skip graphs[J]. ACM Transactions on Algorithms, 2007, 3(4): 37–54. [20] PUGH W. Skip lists: a probabilistic alternative to balanced trees[C]//Algorithms and Data Structures, 1989: 437–449. [21] JACOB R, RICHA A, SCHEIDELER C, et al. Skip +[J]. Journal of the ACM, 2014, 61(6): 1–26. [22] 李德胜, 罗剑波. 特高压直流配套安全稳定控制系统的典型设计[J]. 电力系统自动化, 2016, 40(14): 151–157 LI Desheng, LUO Jianbo. Typical design of security and stability control system for UHVDC transmission[J]. Automation of Electric Power Systems, 2016, 40(14): 151–157 [23] BOSHROOYEH S T, OZKASAP O. Guard: secure routing in skip graph[C]//2017 IFIP Networking Conference (IFIP Networking) and Workshops. Stockholm. IEEE, 2017: 1–2. [24] HASSANZADEH-NAZARABADI Y, KÜPÇÜ A, OZKASAP O. LightChain: a DHT-based blockchain for resource constrained environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2019, 32(10): 2582–2593. [25] 袁勇, 倪晓春, 曾帅, 等. 区块链共识算法的发展现状与展望[J]. 自动化学报, 2018, 44(11): 2011–2022 YUAN Yong, NI Xiaochun, ZENG Shuai, et al. Blockchain consensus algorithms: the state of the art and future trends[J]. Acta Automatica Sinica, 2018, 44(11): 2011–2022 [26] LUU L, NARAYANAN V, ZHENG C D, et al. A secure sharding protocol for open blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna Austria. New York, NY, USA: ACM, 2016: 17–30.
|